breakpad/src/client/linux
Tobias Sargeant 7c2799f3ba Sanitize dumped stacks to remove data that may be identifiable.
In order to sanitize the stack contents we erase any pointer-aligned
word that could not be interpreted as a pointer into one of the
processes' memory mappings, or a small integer (+/-4096).

This still retains enough information to unwind stack frames, and also
to recover some register values.

BUG=682278

Change-Id: I541a13b2e92a9d1aea2c06a50bd769a9e25601d3
Reviewed-on: https://chromium-review.googlesource.com/430050
Reviewed-by: Robert Sesek <rsesek@chromium.org>
2017-01-31 14:13:48 +00:00
..
crash_generation crash_generation: fix bad call to close 2016-12-09 15:56:26 +00:00
data The symbol files necessary for the processor to walk stacks on Linux that have __kernel_vsyscall at innermost frame. Special symbol files ar eneeded because EBP does not point to the frame when a thread is inside a system call. 2009-06-25 21:36:39 +00:00
dump_writer_common Add API to skip dump if crashing thread doesn't reference a given module 2017-01-18 15:41:07 +00:00
handler Sanitize dumped stacks to remove data that may be identifiable. 2017-01-31 14:13:48 +00:00
log [microdump] Move microdump writes to the crash ring-buffer log 2015-08-17 10:32:26 +00:00
microdump_writer Sanitize dumped stacks to remove data that may be identifiable. 2017-01-31 14:13:48 +00:00
minidump_writer Sanitize dumped stacks to remove data that may be identifiable. 2017-01-31 14:13:48 +00:00
sender GoogleCrashdumpUploader: adds Upload(string*) API to get the HTTP response. 2014-09-18 16:48:49 +00:00